General

  • Target

    c5eea1fdb1d0c4c063e080937e66dc7fbb912ed16b963a729b0a6c69750399b1N.exe

  • Size

    110KB

  • Sample

    250117-azldvawmhz

  • MD5

    82719235c3f37609ba3ea38a3a00e250

  • SHA1

    41becfbe073c9ed20074eb13b16246bc28647adf

  • SHA256

    c5eea1fdb1d0c4c063e080937e66dc7fbb912ed16b963a729b0a6c69750399b1

  • SHA512

    996a774695c9c57ddf3ea65abc6d4446421792156006502b2c135494d8720f5b8fceb7fdd169efab769eef59b74d6f4890badc8eca9e7ff0a97caff7d5a9ef2d

  • SSDEEP

    1536:piLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:piyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      c5eea1fdb1d0c4c063e080937e66dc7fbb912ed16b963a729b0a6c69750399b1N.exe

    • Size

      110KB

    • MD5

      82719235c3f37609ba3ea38a3a00e250

    • SHA1

      41becfbe073c9ed20074eb13b16246bc28647adf

    • SHA256

      c5eea1fdb1d0c4c063e080937e66dc7fbb912ed16b963a729b0a6c69750399b1

    • SHA512

      996a774695c9c57ddf3ea65abc6d4446421792156006502b2c135494d8720f5b8fceb7fdd169efab769eef59b74d6f4890badc8eca9e7ff0a97caff7d5a9ef2d

    • SSDEEP

      1536:piLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:piyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks